Locky, Dridex, and Angler among cybercrime groups to experience fall in activity

Quiet period for several major threat groups may be indirectly related to arrests in Russia.Read More Continue reading Locky, Dridex, and Angler among cybercrime groups to experience fall in activity

Fake gaming torrents lead to potentially unwanted applications

PUA downloaders are disguising themselves as torrents for pirated copies of Assassin’s Creed Syndicate and The Witcher 3 to install multiple different PUAs on users’ computers.

Read More Continue reading Fake gaming torrents lead to potentially unwanted applications

Android malware finds new ways to derive current running tasks

Android banking and ad-fraud Trojans leverage ideas found in GitHub-hosted open source projects and use the UsageStats API to bypass Android 5.0 and 6.0 security enhancements.Read More Continue reading Android malware finds new ways to derive current running tasks

SWIFT attackers’ malware linked to more financial attacks

Bank in Philippines was also targeted by attackers, whose malware shares code with tools used by Lazarus group.Read More Continue reading SWIFT attackers’ malware linked to more financial attacks

Android threats evolve to handle Marshmallow’s new permission model

Android.Bankosy and Android.Cepsohord are capable of working with the new runtime permission model introduced in Android 6.0 Marshmallow.Read More Continue reading Android threats evolve to handle Marshmallow’s new permission model